INTERNATIONAL TELECOMMUNICATION UNION ITU-T Technical Paper TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (24 November 2006) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services – Transmission multiplexing and synchronization HSTP-FNTP Firewall and NAT Traversal Problems in H.323 Systems Summary This technical paper analyzes the problem scenarios created for H.323 systems by the existence of Firewall (FW) and Network Address Translator (NAT) devices in IP networks. This document studies the scenarios which are defined in the Technical Paper “Requirements for Network Address Translator and Firewall Traversal of H.323 Multimedia Systems” and studied in ITU-T Study Group 16. The Technical Paper attempts to identify the FW/NAT traversal problems associated with each of these scenarios. Change Log This document contains Version 2 of the ITU-T Technical Paper on “Firewall and NAT Traversal Problems in H.323 Systems” approved at the ITU-T Study Group 16 meeting held in Geneva, 14-24 November 2006. Version 1 was approved at the ITU-T Study Group 16 meeting held in Geneva, 26 July – 5 August 2005 Editor: Sasha Ruditsky RADVISION New Jersey, USA Tel: +1 (201) 689 – 6343 Fax: +1 (201) 689 – 6301 Email: sasha@radvision.com HSTP-FNTP (2006-11) i Contents Page 1 SCOPE ..................................................................................................................................................................... 1 2 REFERENCES ........................................................................................................................................................ 1 3 ABBREVIATIONS ................................................................................................................................................. 1 4 STRUCTURE OF THE DOCUMENT.................................................................................................................. 2 5 TYPES OF NAT DEVICES AND THE NESTING OF NAT DEVICES ........................................................... 2 6 FIREWALL DEVICES AND THE NESTING OF FIREWALL DEVICES ..................................................... 3 6.1 7 THE TYPES OF THE IP COMMUNICATION IN H.323 MULTIMEDIA SYSTEMS .................................. 3 7.1 7.2 7.3 8 MAXIMAL CASE ................................................................................................................................................ 4 MINIMAL CASE ................................................................................................................................................. 5 TYPICAL CASE .................................................................................................................................................. 5 PROBLEMS CAUSED BY FW/NAT DEVICES IN H.323 SYSTEMS ............................................................. 6 8.1 8.2 9 APPLICATION LEVEL GATEWAYS (ALGS) ........................................................................................................ 3 GENERIC PROBLEMS ......................................................................................................................................... 6 PROBLEMS SPECIFIC TO FW/NAT TOPOLOGY .................................................................................................. 7 SCENARIOS IN H.323 MULTIMEDIA SYSTEMS ........................................................................................... 9 9.1 9.2 SCENARIOS IN THE SERVICE PROVIDER CONFIGURATION ................................................................................. 9 SCENARIOS IN THE ENTERPRISE CONFIGURATION .......................................................................................... 10 HSTP-FNTP (2006-11) ii ITU-T Technical Paper HSTP-FNTP ITU-T Technical Paper Firewall and NAT Traversal Problems in H.323 Systems Summary This Technical Paper analyzes the problem scenarios created for H.323 systems by the existence of firewall (FW) and Network Address Translator (NAT) devices in IP networks and attempts to identify the FW/NAT traversal problems associated with each of these scenarios. 1 Scope This Technical Paper analyzes the problem scenarios created for H.323 systems by the existence of firewall (FW) and Network Address Translator (NAT) devices in IP networks and attempts to identify the FW/NAT traversal problems associated with each of these scenarios. This document studies the scenarios which are defined in the ITU-T Technical Paper “Requirements for Network Address Translator and Firewall Traversal of H.323 Multimedia Systems” and studied in SG16. The Technical Paper attempts to identify the FW/NAT traversal problems associated with various scenarios. 2 References [1] ITU-T Recommendation H.323 (2006-06), Packet-based multimedia communications systems [2] ITU-T Recommendation H.225.0 (2006-05), Call signalling protocols and media stream packetization for packet-based multimedia communication systems [3] ITU-T Recommendation H.460.17 (2005-09), Using H.225.0 call signalling connection as transport for H.323 RAS messages [4] IETF RFC 3489 (1999), STUN - Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators (NATs) [5] ITU-T Technical Paper HSTP-RNAT (2005-08), Requirements for Network Address Translator and Firewall Traversal of H.323 Systems 3 Abbreviations ALG Application Level Gateway EP Endpoint FW Firewall GK Gatekeeper IP Internet Protocol NAT Network Address Translator PER ASN.1 Packed Encoding Rules SCTP Stream Control Transmission Protocol TCP Transmission Control Protocol UDP User Datagram Protocol HSTP-FNTP (2006-11) 1 4 Structure of the document The FW/NAT traversal problems existing in H.323 networks are the result of the way H.323 uses the TCP/IP protocol and the way the FW and NAT devices are implemented. This document starts from the description of the types of existing FW and NAT devices and the barriers created by connecting several NAT and/or FW devices together. This document then continues with the analysis of the TCP/UDP/IP operations required for the H.323 protocol functionality. Several H.323 operating modes are analyzed. The document then discuses the problems related to the specific IP operations used by H.323 systems in the different FW/NAT topologies. The final section lists the scenarios described in “The Requirements Document” and provides a mapping of each scenario to the FW/NAT topologies described in the current document. This document analyzes the H.323 usage of UDP and TCP; the usage of SCTP is for further study. 5 Types of NAT devices and the nesting of NAT devices Network Address Translators (NAT) devices are network elements which modify the source or destination IP addresses of the IP packets passing between internal and external networks. The main purpose of NAT devices is to reduce the number of IP addresses needed to represent an internal network in the address space of the external network. NAT devices are also used as topology hiding devices to achieve a particular level of security. According to RFC 3489, NAT devices can be classified as follows: Full Cone: A full cone NAT is one where all requests from the same internal IP address and port are mapped to the same external IP address and port. Furthermore, any external host can send a packet to the internal host by sending a packet to the mapped external address. Restricted Cone: A restricted cone NAT is one where all requests from the same internal IP address and port are mapped to the same external IP address and port. Unlike a full cone NAT, an external host can send a packet to the internal host only if the internal host had previously sent a packet to the IP address of the external host. Port Restricted Cone: A port restricted cone NAT is like a restricted cone NAT, but the restriction includes port numbers. Specifically, an external host can send a packet, with source IP address X and source port P, to the internal host only if the internal host had previously sent a packet to IP address X and port P. Symmetric: A symmetric NAT is one where all requests from the same internal IP address and port to a specific destination IP address and port are mapped to the same external IP address and port. If the same host sends a packet with the same source address and port, but to a different destination, a different mapping is used. Furthermore, only the external host that receives a packet can send a UDP packet back to the internal host. Some networks are separated by several NAT devices. If these NAT devices are connected in such a way that the external network of one device represents the internal network of the other and if all the communicating devices are located in the innermost internal network and in the outermost external one, then the entire chain of NAT devices can be seen as one NAT device belonging to one of the aforementioned types. Figure 1 illustrates the behaviour of two nested NAT devices; by induction, it can be shown that a sequence of any number of NAT devices also behaves as a single NAT device. HSTP-FNTP (2006-11) 2 Internal External Internal External Inner Outer Outer Inner Full Cone Restricted Cone Port Rest. Cone Symmetric Full Cone Full Cone Restricted Cone Port Rest. Cone Symmetric Restricted Cone Restricted Cone Restricted Cone Port Rest. Cone Symmetric Port Rest. Cone Port Rest. Cone Port Rest. Cone Port Rest. Cone Symmetric Symmetric Symmetric Symmetric Symmetric Symmetric Figure 1: The nesting of two NAT devices and their composite behaviour 6 Firewall devices and the nesting of firewall devices One of the functions of firewall devices is to act as packet filters. The firewall examines each packet and then: passes the packet unmodified to the other side; drops the packet entirely; or handles the packet in some other way Firewalls typically base their decisions on the packet’s five-tuple: the protocol value, the source and destination IP addresses, and the source and destination port numbers. Connecting several firewalls sequentially creates a new device, which (from the point of view of the devices communicating through the entire chain of FWs) behaves as a FW with the combined set of decision rules. 6.1 Application Level Gateways (ALGs) Some firewalls implement the logic of a particular protocol. They filter and modify the packets according to the rules of that protocol. Specifically, an H.323 ALG parses H.323 packets and modifies the firewall rules according to the information gathered from H.323 packets. The firewall devices implementing a NAT function and acting as an H.323 ALG can also modify addresses in H.323 packets (inside the PER structures) from their internal values to the external ones. While solving some of the FW/NAT traversal problems for the cases where different FW/NAT traversal solutions are not used, an H.323 ALG is used in concert with other types of FW traversal solutions may actually produce additional problems. 7 The types of the IP Communication in H.323 Multimedia systems For the purpose of the analysis performed in this section it is assumed that H.323 systems consist of two H.323 EPs and one or two GKs. If only one GK is used, it serves both EPs. If two GKs are used, each EP is served by its own GK. A similar assumption is made in [5]. H.323 can use several different modes of operation, i.e. tunnelled vs. separate H.245, H.225.0 over TCP versus Annex E, direct-routed versus GK-routed signalling, etc. The different modes of operation have different FW/NAT traversal problems. HSTP-FNTP (2006-11) 3 This clause lists the various types of communication (IP operations) used by H.323 systems. Three different cases are presented: Maximal case: all H.323 modes are supported Minimal case: only the most FW/NAT friendly mode is supported (i.e. H.460.17’s RAS over a persistent TCP connection and the GK-routed call signalling with tunnelled H.245). Typical case: the mode which is believed to be widely deployed mode is RAS over UDP, and GK-routed H.225.0 over TCP with separate H.245. 7.1 Maximal case The H.323 standard requires the following types of communication between H.323 entities: EP to its GK EP to the peer’s GK GK to GK EP to EP Depending on the placement of the GKs and the EPs relative to the FW/NATs in the network, one or more types of communication may be problematic. 7.1.1 Communication between the endpoint and its gatekeeper The following basic TCP/IP operations are normally performed by the H.323 entities and may be subject to FW/NAT traversal problems (in the following list “well-known” means defined by IANA and known to FW devices, known a priori means known by some external means to the device which is going to use it, but not necessarily known to the FW device): Sending a multicast UDP datagram from the EP to the GK to the well-known address Sending a unicast UDP datagram from the EP to the GK to the address known a priori Sending a unicast UDP datagram from the EP to the GK to the address provided by the GK Sending a unicast UDP datagram from the GK to the EP to the address provided by the EP Establishing a TCP connection from the EP to the GK to the address provided by the GK Establishing a TCP connection from the GK to the EP to the address provided by the EP 7.1.2 Communication between the endpoint and the peer’s gatekeeper The following basic TCP/IP operations are performed by the H.323 entities and may be subject to FW/NAT traversal problems: Establishing a TCP connection from the EP to the peer’s GK to the address provided by the EP’s GK Establishing a TCP connection from the GK to the EP to the address provided by the EP 7.1.3 Communication between the gatekeepers The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Sending a multicast UDP datagram to the well-known address Sending a unicast UDP datagram to the address known a priori Establishing of a TCP connection to the address provided by the GK accepting the connection HSTP-FNTP (2006-11) 4 7.1.4 Communication between the endpoints The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Sending a unicast UDP datagram to the address provided by the receiving EP Establishing a TCP connection to the address provided by the accepting EP 7.2 Minimal case The previous section defines the communication types required to implement all the possible H.323 operation modes. In the environment where all entities support the most FW/NAT friendly H.323 mode (as defined before) the smaller set of IP operations is required. This clause defines such a minimum set. The H.323 standard requires at least the following types of communication between H.323 entities: EP to its GK GK to GK EP to EP 7.2.1 Communication between the endpoint and its gatekeeper The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Establishing a TCP connection from the EP to the GK to the address provided by the GK 7.2.2 Communication between the gatekeepers The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Establishing a TCP connection to the address provided by the GK accepting the connection 7.2.3 Communication between the endpoints The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Sending a unicast UDP datagram to the address provided by the receiving EP 7.3 Typical case The most widely deployed H.323 networks use the following types of communication between the entities: EP to its GK GK to GK EP to EP 7.3.1 Communication between the endpoint and its gatekeeper The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Sending a unicast UDP datagram from the EP to the GK to the address known a priori Sending a unicast UDP datagram from the EP to the GK to the address provided by the GK HSTP-FNTP (2006-11) 5 Sending a unicast UDP datagram from the GK to the EP to the address provided by the EP Establishing a TCP connection from the EP to the GK to the address provided by the GK Establishing a TCP connection from the GK to the EP to the address provided by the EP 7.3.2 Communication between the gatekeepers The following basic TCP/IP operations are performed by H.323 entities and may be subject to FW/NAT traversal problems: Establishing a TCP connection to the address provided by the GK accepting the connection 7.3.3 Communication between endpoints The following basic TCP/IP operations are normally performed by H.323 entities and may be subject to FW/NAT traversal problems: Sending a unicast UDP datagram to the address provided by the receiving EP Establishing a TCP connection to the address provided by the accepting EP 8 Problems caused by FW/NAT devices in H.323 systems 8.1 Generic problems 8.1.1 Discovery of the topology As described in this document there are several possible FW/NAT topologies between two communicating entities. Different topologies represent different problems and, as a result, the topology discovery mechanism may be needed. The solutions for the FW/NAT traversal problem should provide a means to discover the FW/NAT topology between the communicating entities. The results of such a discovery should contain information about the: presence in the communication path of the NAT devices and their type presence in the communication path of the FW devices presence in the communication path of the H.323 ALG(s) 8.1.2 Dynamic port allocation The main role of the firewalls is to restrict the network traffic by allowing only legitimate traffic. The H.323 protocol uses dynamic port allocation for several of its functions, and any one of the 65535 available UDP and TCP ports may be used by an H.323 device. This makes it impossible to define the set of rules for filtering the H.323 packets by an H.323-unaware FW device. The FW/NAT traversal solution should allow the configuration of the FW to enable or disable the H.323 traffic, while not affecting the filtering of the other protocols’ packets by an H.323-unaware FW. 8.1.3 Problems with usage of intermediary devices The FW/NAT traversal solutions regularly involve the usage of intermediary H.323 devices. While solving one particular problem, such solutions often create others. This clause discusses these problems. 8.1.3.1 H.323 ALG related problems The H.323 ALG is an entity which is not defined by the H.323 standard. This means that its behaviour in certain situations is not known and/or predictable. HSTP-FNTP (2006-11) 6 For example, let’s assume that an H.323 entity located behind the H.323 ALG equipped firewall discovers the H.323 entity’s external address (using for instance the STUN protocol) and uses it in the H.323 messages. The ALG receiving such messages normally translates internal addresses into external ones. It is not defined what the ALG behaviour should be when it receives an external address. 8.1.3.2 Security related problems Intermediary devices may be required to modify the transport addresses located in the H.323 messages. This may create problems if the communicating H.323 entities use the H.235 integrity protection mechanisms. In this case, every intermediary device shall be able to digitally sign the message after it has been modified (which in other words means that every intermediary shall be a trusted entity). 8.1.3.3 QoS related problems Every intermediary entity in the media communication path creates an additional media delay, jitter and increases probability of packet loss. The suboptimal selection of intermediary devices can create situations where the media packets travel half-way over the globe just to be routed back to the room next door. 8.2 Problems specific to FW/NAT topology The following three FW/NAT topologies are possible between two communicating H.323 entities: Direct connection: there is no FW/NAT device between the two H.323 entities FW/NAT device: one or more FW/NAT devices with the same orientation (external network of the previous device is connected to the internal network of the next) are present in the path between the two H.323 entities Head to head FW/NAT: each one of the two H.323 entities is located behind one or more FW/NAT devices. These FW/NAT devices are connected to the same external network Direct connection, by definition, does not create any FW/NAT traversal problems (not counting the problem of discovery of the direct connection). The following clauses describe the problems associated with the two other topologies involving FW/NAT devices. Each topology contains a description of the problems with performing a particular IP operation in such a topology. Only the IP operations which are required for the “typical H.323 case” (as defined above) are discussed. 8.2.1 FW/NAT device between the two H.323 communicating entities 8.2.1.1 Sending a unicast UDP datagram to the external address known a priori This operation does not create any known problems associated with NAT traversal. For FW traversal, the operation requires the communication with the specified destination address to be allowed. Taking into account that such an address is known a priori, this should not create any particular problems. 8.2.1.2 Sending a unicast UDP datagram to the address provided by the external peer This operation does not create any known problems associated with NAT traversal. For FW traversal, the operation requires the communication with the specified destination address to be allowed. Taking into account that such an address is dynamically allocated by the peer and that there are no standard defined rules restricting the values which the address can take, this type of communication creates FW traversal problems. HSTP-FNTP (2006-11) 7 8.2.1.3 TCP connection established to the dynamic address provided by an external entity The establishment of TCP connections to the external entity does not create known problems with NAT devices. Maintaining such connections require some kind of network activity over the connection happening more frequently then the binding expiration time defined by the NAT device. Use of the TCP keep-alive mechanism solves this problem, but nothing in the H.323 Recommendation mandates or recommends the use of this mechanism. For FW traversal, the operation creates the same type of problems as any operation involving dynamic addresses as described before. 8.2.1.4 Sending a unicast UDP datagram to the internal address known a priori Only Full Cone NAT devices and the NAT devices allowing static address mapping allow this type of operation. The rest of the NAT devices require a UDP datagram to be sent in the opposite direction before this operation. For FW traversal, the operation requires the communication with the specified internal destination address to be allowed. Taking into account that such address is known a priori, this should not create any additional problems. 8.2.1.5 Sending a unicast UDP datagram to the internal address provided by the peer The NAT devices require UDP datagrams to be sent from the internal to the external address (which depends on the type of NAT device used) before this operation. In most of the cases which use this type of operation in H.323 (i.e. RAS messages, RTP/RTCP messages, etc), such a prior message can be identified. Unfortunately, H.323 forbids usage of the UDP/IP level address from which message has arrived and instead mandates usage of the corresponding H.323 level field. H.323 also allows using different addresses for sending and receiving RAS and RTP/RTCP packets, which adds complexity to this problem. To allow for the sending of UDP datagrams to the internal address for an extended period of time, the UDP datagrams from this internal address should be sent periodically to the external address. For FW traversal, the operation creates the same type of problems as any operation involving dynamic addresses as described before. 8.2.1.6 Establishing a TCP connection to the dynamic address provided by the internal entity This operation is normally disabled by NAT devices. For FW traversal, the operation creates the same type of problems as any operation involving dynamic addresses as described before. 8.2.2 Head-to-head FW/NAT devices between the two H.323 communicating entities 8.2.2.1 Sending a unicast UDP datagram to the address known a priori This operation involves sending UDP datagrams to the external network of the first NAT device and then to the internal network of the second NAT device. As described before, such an operation is only allowed if the second NAT device is a Full Cone NAT device, or if it allows static address mapping. The traversal of both FWs is a question of configuration and of taking into account that the address is known a priori; hence this configuration should not create additional problems. HSTP-FNTP (2006-11) 8 8.2.2.2 Sending a unicast UDP datagram to the address provided by the peer This operation involves sending UDP datagrams to the external network of the first NAT device and then to the internal network of the second NAT device. Sending UDP datagrams to a dynamic internal address creates problems, as discussed in clause 8.2.1.5. In the cases where the second NAT device (the NAT device traversed in the direction from the external to the internal network) is not a Full Cone NAT device, the direct UDP communication through head to head NAT devices is impossible. The only known way to enable UDP communication in this case is through the usage of an intermediary entity placed on the external network. For FW traversal, the operation creates the same type of problems as any operation involving dynamic addresses as described before. 8.2.2.3 Establishing a TCP connection between entities This operation is normally disabled by the NAT devices in the direction from the external to the internal network. For FW traversal the operation creates the same type of problems as any operation involving dynamic addresses as described before. 9 Scenarios in H.323 Multimedia Systems The following clause is based on the list of scenarios provided in [5]. For each scenario the section specifies which FW/NAT traversal topologies defined in clause 8.2 are applied to the communication between a particular pair of H.323 entities. 9.1 9.1.1 Scenarios in the Service Provider Configuration Scenario 1 – The endpoints are in the same domain with private addresses EP to GK – FW/NAT EP – internal, GK – external EP to EP – direct connection 9.1.2 Scenario 2 – The endpoints are in the different domains with private addresses EP to GK – FW/NAT EP – internal, GK – external EP to EP – two FW/NAT head to head 9.1.3 Scenario 3 – One endpoint has public address and another has private address EP1 to GK – FW/NAT EP – internal, GK – external EP2 to GK – direct connection EP to EP – FW/NAT 9.1.4 Scenario 4 – The endpoints are in the same multi-level realm with private addresses EP to GK – FW/NAT EP – internal, GK – public EP to EP – direct connection 9.1.5 Scenario 5 – The endpoints are in the different multi-level realms with private addresses EP to GK – FW/NAT EP – internal, GK – external EP to EP – FW/NAT HSTP-FNTP (2006-11) 9 9.1.6 Scenario 6 – One endpoint is in a multi-level realm with private addresses, another endpoint is in a realm with private addresses EP to GK – FW/NAT EP – internal, GK – external EP to EP – two FW/NAT head to head 9.1.7 Scenario 7 - One endpoint is in a multi-level realm with private addresses, another endpoint is in a realm with public addresses EP1 to GK – FW/NAT EP – internal, GK – external EP2 to GK – direct connection EP to EP – FW/NAT 9.2 9.2.1 Scenarios in the Enterprise Configuration Scenario 1 – The endpoints and the gatekeeper are in a realm with private addresses EP to GK – direct connection EP to EP – direct connection 9.2.2 Scenario 2 - One endpoint and the gatekeeper are in the same realm with private addresses, another endpoint is in another realm with private addresses EP1 to GK – head to head FW/NAT EP2 to GK – direct connection EP to EP – head to head FW/NAT 9.2.3 Scenario 3 - One endpoint and its GK are in the same realm with private addresses, another endpoint and its GK are in another realm with private addresses EP to GK – direct connection GK to GK – head to head FW/NAT EP to EP – head to head FW/NAT 9.2.4 Scenario 4 - One endpoint and its GK are in the same realm with private addresses, another endpoint and its GK are in the realm with public addresses EP1 to GK1 – direct connection EP2 to GK2 – direct connection GK to GK – FW/NAT EP to EP – FW/NAT 9.2.5 Scenario 5 - One endpoint and its GK are in different realms with private addresses, another endpoint and its GK are in a realm with globally unique registered addresses EP1 to GK1 – head to head FW/NAT EP2 to GK2 – direct connection GK to GK – FW/NAT EP to EP – FW/NAT HSTP-FNTP (2006-11) 10 9.2.6 Scenario 6 - One endpoint and its GK are in a multi-level realm with private addresses, another endpoint and its GK are in a realm with globally unique registered addresses EP1 to GK1 – direct connection EP2 to GK2 – direct connection GK to GK – FW/NAT EP to EP – FW/NAT 9.2.7 Scenario 7 - One endpoint and its GK are in different multi-level realms with private addresses, another endpoint and its GK are in a realm with globally unique registered addresses EP1 to GK1 – FW/NAT EP – internal, GK – external EP2 to GK2 – direct connection GK to GK – FW/NAT EP to EP – FW/NAT 9.2.8 Scenario 8 - One endpoint and the GK are in a realm with private addresses, another endpoint is in a different multi-level realm EP1 to GK – FW/NAT EP – internal, GK – external EP2 to GK – direct connection EP to EP – FW/NAT 9.2.9 Scenario 9 - One endpoint and its GK are in a realm with private addresses, another endpoint and its GK are in a different multi-level realm EP1 to GK1 – direct connection EP2 to GK2 – direct connection GK to GK – head to head FW/NAT EP to EP – head to head FW/NAT 9.2.10 Scenario 10 - One endpoint and its GK are in a realm with private addresses, another endpoint is roaming outside of the enterprise realm EP1 to GK – direct connection EP2 to GK – FW/NAT GK – internal, EP – external EP to EP – FW/NAT 9.2.11 Scenario 11 - One endpoint is roaming outside of the enterprise realm, its GK is in a realm with private addresses; another endpoint and its GK are in a realm with globally unique registered addresses EP1 to GK1 – direct connection EP2 to GK2 – FW/NAT GK – internal, EP – external GK to GK – FW/NAT EP to EP – direct connection ___________________ HSTP-FNTP (2006-11) 11